HTTPCS Advisory : HTTPCS79 Product : w-agora Version : 4.2.1 Date : 2012-08-17 Criticality level : Highly Critical Description : A vulnerability has been discovered in w-agora, which can be exploited by malicious people to conduct SQL injection attacks. Input passed via the 'pattern' parameter to '/users.php' is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Page : /users.php Variables : pattern=[VulnHTTPCS] Type : SQLI Method : GET Solution : References : https://www.httpcs.com/advisory/httpcs79 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ HTTPCS Advisory : HTTPCS80 Product : w-agora Version : 4.2.1 Date : 2012-08-17 Criticality level : Highly Critical Description : A vulnerability has been discovered in w-agora, which can be exploited by malicious people to conduct SQL injection attacks. Input passed via the 'att_id' parameter to '/getfile.php' is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Page : /getfile.php Variables : att_id=[VulnHTTPCS] Type : SQLI Method : GET Solution : References : https://www.httpcs.com/advisory/httpcs80 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ HTTPCS Advisory : HTTPCS81 Product : w-agora Version : 4.2.1 Date : 2012-08-17 Criticality level : Highly Critical Description : A vulnerability has been discovered in w-agora, which can be exploited by malicious people to conduct SQL injection attacks. Input passed via the 'search_user' parameter to '/search.php' is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Page : /search.php Variables : search_user=[VulnHTTPCS] Type : SQLI Method : POST Solution : References : https://www.httpcs.com/advisory/httpcs81 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ HTTPCS Advisory : HTTPCS82 Product : w-agora Version : 4.2.1 Date : 2012-08-17 Criticality level : Highly Critical Description : A vulnerability has been discovered in w-agora, which can be exploited by malicious people to conduct SQL injection attacks. Input passed via the 'search_forum' parameter to '/search.php' is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Page : /search.php Variables : search_forum=[VulnHTTPCS] Type : SQLI ethod : POST Solution : References : https://www.httpcs.com/advisory/httpcs82 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ HTTPCS Advisory : HTTPCS78 Product : w-agora Version : 4.2.1 Date : 2012-08-17 Criticality level : Less Critical Description : A vulnerability has been discovered in w-agora, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the 'full' parameter to '/users.php' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Page : /users.php Variables : full=[VulnHTTPCS] Type : XSS Method : GET Solution : References : https://www.httpcs.com/advisory/httpcs78 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ HTTPCS Advisory : HTTPCS77 Product : w-agora Version : 4.2.1 Date : 2012-08-17 Criticality level : Less Critical Description : A vulnerability has been discovered in w-agora, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the 'att_id' parameter to '/getfile.php' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Page : /getfile.php Variables : att_id=[VulnHTTPCS] Type : XSS Method : GET Solution : References : https://www.httpcs.com/advisory/httpcs77 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ Twitter : http://twitter.com/HTTPCS_ Advisories : https://www.httpcs.com/advisories Free web vulnerability scanner HTTPCS _______________________________________________